A remote file include vulnerability exists in CS-Cart 1.3.3. An attacker can exploit this vulnerability to include arbitrary files from remote locations by sending a specially crafted HTTP request to the vulnerable application. This can lead to arbitrary code execution on the vulnerable system.
Webspotblogging 3.0.1 is vulnerable to a remote file include vulnerability. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can allow the attacker to execute arbitrary code on the server.
BlueShoes Framework 4.6 is vulnerable to a remote file include vulnerability. This vulnerability allows an attacker to include a remote file, usually through a malicious URL, containing arbitrary code which is then executed on the vulnerable server. The vulnerable parameters are APP[path][applications], APP[path][core], GLOBALS[APP][path][core], and APP[path][plugins].
DotClear is vulnerable to arbitrary remote inclusion due to improper validation of user-supplied input in the 'blog_dc_path' parameter of the 'prepend.php' script. An attacker can exploit this vulnerability to execute arbitrary code on the vulnerable system.
None
Multiple PHP-Nuke versions are vulnerable to a remote file include vulnerability. This vulnerability allows an attacker to include a remote file, usually through a malicious URL, and execute it on the vulnerable server. This can lead to arbitrary code execution, information disclosure, and other malicious activities.
A remote file include vulnerability exists in Informium 0.12.0. An attacker can exploit this vulnerability to include arbitrary files from remote locations by sending a specially crafted HTTP request to the vulnerable server. This can lead to arbitrary code execution on the vulnerable server.
A vulnerability in Igloo 0.1.9 and prior versions allows remote attackers to include arbitrary files via a URL in the c_node[class_path] parameter to class/Wiki/Wiki.php.
Redaxo CMS versions 3.2, 3.1, 3.0, and 2.7.4 are vulnerable to a remote file include vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing a malicious URL in the REX[INCLUDE_PATH] parameter. This can allow the attacker to execute arbitrary code on the vulnerable system.
ACID v1.1.3 CMS is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary PHP code within the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.